General

  • Target

    2024-02-14_15efadc69cf335aaf1f03af8ae36c866_cryptolocker

  • Size

    77KB

  • MD5

    15efadc69cf335aaf1f03af8ae36c866

  • SHA1

    78d2827f8633cb4f1b46fe77ced2f9e18d037143

  • SHA256

    e88d9bc456d73cc0573bdd7196fb73e897339627984ab1bcbddca82faa13cc29

  • SHA512

    b15acdee813c533c3b36d8a0d3ca66d548fbf35dc6f50fe25b0acea363bb5c25ebc6a6316c9c1ad808d8f0ea6154628e55b6a29afcaf6fdfcc2a52d2bb522cae

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7QO:zCsanOtEvwDpjS

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_15efadc69cf335aaf1f03af8ae36c866_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections